Skip to main content

The Malware Museum

Mikko Hypponen

The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation or messages that you had been infected. Through the use of emulations, and additionally removing any destructive routines within the viruses, this collection allows you to experience virus infection of decades ago with safety.

86
RESULTS
rss


PART OF
Software History Collection
Media Type
83
software
2
texts
1
movies
Availability
86
Always Available
Topics & Subjects
2
virus
2
viruses
1
History
1
Malware
1
Virus
1
activation
More right-solid
Collection
86
The Malware Museum
86
Software History Collection
46
Software Library
46
The Software Library: MS-DOS
4
Chisoe12 Favorites
2
lalochezia Favorites
More right-solid
Creator
2
mikko hyppönen
1
daniel white
1
mikko hypponen
Language
85
English
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
The Malware Museum
Aug 12, 2016
software
eye 849
favorite 0
comment 0
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
The Malware Museum
Aug 12, 2016
software
eye 415
favorite 0
comment 0
Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.
The Malware Museum
Aug 12, 2016
software
eye 330
favorite 0
comment 0
Malware Example: DENSCARE.COM *DENSCARE.COM - upon invocation, DenZukoScare (tm) immediately displays the popular DEN ZUK virus graphic effect and exits.
The Malware Museum
Aug 12, 2016
software
eye 356
favorite 0
comment 0
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
The Malware Museum
Feb 24, 2016 Daniel White
software
eye 2,720
favorite 0
comment 1
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Virus, History, Malware
The Malware Museum
Feb 11, 2016 Mikko Hyppönen
texts
eye 664
favorite 0
comment 0
This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
The Malware Museum
Feb 11, 2016 Mikko Hyppönen
texts
eye 427
favorite 0
comment 0
This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
The Malware Museum
Feb 5, 2016 Mikko Hypponen
movies
eye 16,214
favorite 6
comment 0
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
The Malware Museum
Feb 5, 2016
software
eye 15,860
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 3,471
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 2,158
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 1,797
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 2,193
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 1,753
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 1,807
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 1,805
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 1,805
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 1,812
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 1,818
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 1,737
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
Feb 5, 2016
software
eye 2,117
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 9,812
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 11,004
favorite 1
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 15,740
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
Feb 5, 2016
software
eye 1,808
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 12,897
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 2,392
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 1,858
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 3,227
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 44,732
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
Feb 5, 2016
software
eye 14,115
favorite 1
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 1,956
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 1,853
favorite 2
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 7,337
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
Feb 5, 2016
software
eye 9,598
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 2,285
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 2,419
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 1,955
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 2,603
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 4,357
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 16,137
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 1,809
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 1,807
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 29,625
favorite 1
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 4 reviews )
The Malware Museum
Feb 5, 2016
software
eye 2,268
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 10,647
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 2,741
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 1,829
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 5,045
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 1,820
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 23,490
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
Feb 5, 2016
software
eye 6,791
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 3,185
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 4,854
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 7,574
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 4,432
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 2,072
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 2,404
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 1,830
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 2,130
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 2,213
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 34,825
favorite 1
comment 3
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
Feb 5, 2016
software
eye 3,157
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 8,744
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 1,805
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 9,430
favorite 0
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
Feb 5, 2016
software
eye 31,839
favorite 0
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
The Malware Museum
Feb 5, 2016
software
eye 2,661
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 20,984
favorite 1
comment 4
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
The Malware Museum
Feb 5, 2016
software
eye 5,047
favorite 1
comment 2
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
Feb 5, 2016
software
eye 1,962
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 5,718
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 2,178
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
Feb 5, 2016
software
eye 10,846
favorite 0
comment 1
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
Feb 5, 2016
software
eye 2,677
favorite 0
comment 0
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.